Mailpit author reports:
+++ +The Mailpit WebSocket server is configured to accept + connections from any origin. This lack of Origin header + validation introduces a Cross-Site WebSocket Hijacking + (CSWSH) vulnerability.
+ +An attacker can host a malicious website that, when + visited by a developer running Mailpit locally, establishes + a WebSocket connection to the victim's Mailpit instance + (default ws://localhost:8025). This allows the attacker + to intercept sensitive data such as email contents, + headers, and server statistics in real-time.
+
phpMyFAQ team reports:
Stored cross-site scripting (XSS) and unauthenticated config backup download vulnerability
Chrome Releases reports:
This update includes 1 security fix:
- [463155954] High CVE-2026-0628: Insufficient policy enforcement in WebView tag. Reported by Gal Weizman on 2025-11-23
Libsodium maintainer reports:
The function crypto_core_ed25519_is_valid_point(), a low-level function used to check if a given elliptic curve point is valid, was supposed to reject points that aren't in the main cryptographic group, but some points were slipping through.
Mailpit author reports:
A Server-Side Request Forgery (SSRF) vulnerability exists in Mailpit's /proxy endpoint that allows attackers to make requests to internal network resources.
The /proxy endpoint allows requests to internal network resources. While it validates http:// and https:// schemes, it does not block internal IP addresses, allowing attackers to access internal services and APIs.
net-snmp development team reports:
A specially crafted packet to an net-snmp snmptrapd daemon can cause a buffer overflow and the daemon to crash.
The GStreamer Security Center reports:
Multiple out-of-bounds reads in the MIDI parser that can cause crashes for certain input files.